~kamalmostafa/ubuntu/+source/linux/+git/precise:master-next

Last commit made on 2016-08-30
Get this branch:
git clone -b master-next https://git.launchpad.net/~kamalmostafa/ubuntu/+source/linux/+git/precise
Only Kamal Mostafa can upload to this branch. If you are Kamal Mostafa please log in for upload directions.

Branch merges

Branch information

Recent commits

a684e71... by Tim Gardner

UBUNTU: Start new release

Ignore: yes
Signed-off-by: Tim Gardner <email address hidden>

9a8c071... by Tim Gardner

UBUNTU: Ubuntu-3.2.0-110.151

Signed-off-by: Tim Gardner <email address hidden>

658c7b1... by Chen Yu <email address hidden>

UBUNTU: SAUCE: PCI: Workaround to enable poweroff on Mac Pro 11

BugLink: http://bugs.launchpad.net/bugs/1587714

People reported that they can not do a poweroff nor a
suspend to ram on their Mac Pro 11. After some investigations
it was found that, once the PCI bridge 0000:00:1c.0 reassigns its
mm windows to ([mem 0x7fa00000-0x7fbfffff] and
[mem 0x7fc00000-0x7fdfffff 64bit pref]), the region of ACPI
io resource 0x1804 becomes unaccessible immediately, where the
ACPI Sleep register is located, as a result neither poweroff(S5)
nor suspend to ram(S3) works.

As suggested by Bjorn, further testing shows that, there is an
unreported device may be (using) conflict with above aperture,
which brings unpredictable result such as the failure of accessing
the io port, which blocks the poweroff(S5). Besides if we reassign
the memory aperture to the other place, the poweroff works again.

As we do not find any resource declared in _CRS which contain above
memory aperture, and Mac OS does not use this pci bridge neither, we
choose a simple workaround to clear the hotplug flag(suggested by
Yinghai Lu), thus do not allocate any resource for this pci bridge,
and thereby no conflict anymore.

Bugzilla: https://bugzilla.kernel.org/show_bug.cgi?id=103211
Cc: Bjorn Helgaas <email address hidden>
Cc: Rafael J. Wysocki <email address hidden>
Cc: Lukas Wunner <email address hidden>
Signed-off-by: Chen Yu <email address hidden>
Reference: https://patchwork.kernel.org/patch/9289777/
Signed-off-by: Kamal Mostafa <email address hidden>
Acked-by: Brad Figg <email address hidden>
Acked-by: Stefan Bader <email address hidden>
Signed-off-by: Tim Gardner <email address hidden>

4c96542... by Dave Weinstein <email address hidden>

arm: oabi compat: add missing access checks

CVE-2016-3857

Add access checks to sys_oabi_epoll_wait() and sys_oabi_semtimedop().
This fixes CVE-2016-3857, a local privilege escalation under
CONFIG_OABI_COMPAT.

Cc: <email address hidden>
Reported-by: Chiachih Wu <email address hidden>
Reviewed-by: Kees Cook <email address hidden>
Reviewed-by: Nicolas Pitre <email address hidden>
Signed-off-by: Dave Weinstein <email address hidden>
Signed-off-by: Linus Torvalds <email address hidden>
(cherry picked from commit 7de249964f5578e67b99699c5f0b405738d820a2)
Acked-by: Brad Figg <email address hidden>
Signed-off-by: Luis Henriques <email address hidden>
Signed-off-by: Tim Gardner <email address hidden>

21cb4ea... by Kamal Mostafa

UBUNTU: Start new release

Ignore: yes
Signed-off-by: Kamal Mostafa <email address hidden>

39c37ac... by Stefan Bader

UBUNTU: Ubuntu-3.2.0-109.150

Signed-off-by: Stefan Bader <email address hidden>

ba9f9b4... by Eric Dumazet <email address hidden>

tcp: make challenge acks less predictable

commit 75ff39ccc1bd5d3c455b6822ab09e533c551f758 upstream.

Yue Cao claims that current host rate limiting of challenge ACKS
(RFC 5961) could leak enough information to allow a patient attacker
to hijack TCP sessions. He will soon provide details in an academic
paper.

This patch increases the default limit from 100 to 1000, and adds
some randomization so that the attacker can no longer hijack
sessions without spending a considerable amount of probes.

Based on initial analysis and patch from Linus.

Note that we also have per socket rate limiting, so it is tempting
to remove the host limit in the future.

v2: randomize the count of challenge acks per second, not the period.

Fixes: 282f23c6ee34 ("tcp: implement RFC 5961 3.2")
Reported-by: Yue Cao <email address hidden>
Signed-off-by: Eric Dumazet <email address hidden>
Suggested-by: Linus Torvalds <email address hidden>
Cc: Yuchung Cheng <email address hidden>
Cc: Neal Cardwell <email address hidden>
Acked-by: Neal Cardwell <email address hidden>
Acked-by: Yuchung Cheng <email address hidden>
Signed-off-by: David S. Miller <email address hidden>
[bwh: Backported to 3.2:
 - Adjust context
 - Use ACCESS_ONCE() instead of {READ,WRITE}_ONCE()
 - Open-code prandom_u32_max()]
Signed-off-by: Ben Hutchings <email address hidden>

CVE-2016-5696

[smb: Picked from ff13c4bb5dfe5cd1bd75e2720d1f0aa2e6e81246 bwh-queue]

Signed-off-by: Stefan Bader <email address hidden>
Acked-by: Christopher Arges <email address hidden>
Acked-by: Kamal Mostafa <email address hidden>
Acked-by: Luis Henriques <email address hidden>
Signed-off-by: Stefan Bader <email address hidden>

8b805c5... by Kamal Mostafa

UBUNTU: Start new release

Ignore: yes
Signed-off-by: Kamal Mostafa <email address hidden>

469ba17... by Stefan Bader

UBUNTU: Ubuntu-3.2.0-108.149

Signed-off-by: Stefan Bader <email address hidden>

6f86816... by Scott Bauer <email address hidden>

HID: hiddev: validate num_values for HIDIOCGUSAGES, HIDIOCSUSAGES commands

This patch validates the num_values parameter from userland during the
HIDIOCGUSAGES and HIDIOCSUSAGES commands. Previously, if the report id was set
to HID_REPORT_ID_UNKNOWN, we would fail to validate the num_values parameter
leading to a heap overflow.

Cc: <email address hidden>
Signed-off-by: Scott Bauer <email address hidden>
Signed-off-by: Jiri Kosina <email address hidden>
(cherry picked from commit 93a2001bdfd5376c3dc2158653034c20392d15c5)
CVE-2016-5829
Signed-off-by: Luis Henriques <email address hidden>
Acked-by: Stefan Bader <email address hidden>
Signed-off-by: Kamal Mostafa <email address hidden>